This manual is intended for people who want to want to configure the ZyWALL
using the Web Configurator.
How To Use This Guide
•Read Chapter 1 on page 31 chapter for an overview of features available on the
ZyWALL.
•Read Chapter 3 on page 43 for web browser requirements and an introduction
to the main components, icons and menus in the ZyWALL Web Configurator.
•Read Chapter 4 on page 59 if you’re using the installation wizard for first time
setup and you want more detailed information than what the real time online
help provides.
•Read Chapter 5 on page 69 if you’re using the quick setup wizards and y ou want
more detailed information than what the real time online help provides.
• It is highly recommended you read Chapter 6 on page 87 for detailed
information on essential terms us ed in the ZyWALL, what prerequisites are
needed to configure a feature and how to use that feature.
• It is highly recommended you read Chapter 7 on page 109 for ZyWALL
application examples.
• Subsequent chapters are arranged by menu item as defined in the Web
Configurator. Read each chapter carefully for detailed information on that menu
item.
• To find specific information in this guide, use the Contents Overview, the Table of Contents, the Index, or search the PDF file. E-mail
techwriters@zyxel.com.tw if you cannot find the information you require.
Related Documentation
•Quick Start Guide
The Quick Start Guide is designed to show you how to make the ZyWALL
hardware connections and access the Web Configurator wizards. (See the
wizard real time help for information on configuring each screen.) It also
contains a connection diagram and package contents list.
•CLI Reference Guide
The CLI Reference Guide explains how to use the Command-Line Interface (CLI)
to configure the ZyWALL.
Note: It is recommended you use the Web Configurator to configure the ZyWALL.
ZyWALL USG 50 User’s Guide
3
About This User's Guide
• Web Configurator Online Help
Click the help icon in any screen for help in configuring that screen and
supplementary information.
• ZyXEL Web Site
Please refer to www.zyxel.com
product certifications.
for additional support documentation and
User Guide Feedback
Help us help you. Send all User Guide-related comments, questi ons or suggestions
for improvement to the following address, or use e-mail instead. Thank you!
The Technical Writing Team,
ZyXEL Communications Corp.,
6 Innovation Road II,
Science-Based Industrial Park,
Hsinchu, 300, Taiwan.
E-mail: techwriters@zyxel.com.tw
Need More Help?
More help is available at www.zyx el.com.
4
• Download Library
Search for the latest product updates and documentation from this link. Read
the Tech Doc Overview to find out how to efficiently use the User Guide, Quick
Start Guide and Command Line Interface Reference Guide in order to better
understand how to use your product.
• Knowledge Base
If you have a specific question about your product, the answer may be here.
This is a collection of answers to previously asked questions about ZyXEL
products.
ZyWALL USG 50 User’s Guide
About This User's Guide
•Forum
This contains discussions on ZyXEL prod ucts. Learn from others who use ZyXEL
products and share your experiences as well.
Customer Support
Should problems arise that cannot be solved by the methods listed above, you
should conta ct your vendor. If you cannot contact your vendor, then contact a
ZyXEL office for the region in which you bought the device.
See http://www.zyxel.com/web/contact_us.php for contact information. Please
have the following informatio n ready when you contact an office.
• Product model and serial number.
•Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.
Disclaimer
Graphics in this book may differ slightly from the product due to differences in
operating systems, operating system versions, or if you installed updated
firmware/software fo r y our dev ice. Ev ery effort has been made to ensur e that the
information in this manual is accurate.
ZyWALL USG 50 User’s Guide
5
Document Conventions
Warnings and Notes
These are how warnings and notes are shown in this User’s Guide.
Warnings tell you about things that could harm you or your device.
Note: Notes tell you other important information (for example, other things you may
need to configure or helpful tips) or recommendations.
Syntax Conventions
• The ZyWALL may be referred to as the “ZyWALL”, the “device”, the “system” or
the “product” in this User’s Guide.
• Product labels, screen names, field labels and field choices are all in bold font.
Document Conventions
• A key stroke is denoted by square brackets and uppercase text, for example,
[ENTER] means the “enter” or “ret urn” key on your keyboard.
• “Enter” means for you to type one or more characters and then press the
[ENTER] key. “Select” or “choose” means for you to use one of the predefined
choices.
• A right angle bracket ( > ) within a screen name denotes a mouse click. For
example, Maintenance > Log > Log Setting means you first click
Maintenance in the navigation panel, then the Log sub menu and finally the
Log Setting tab to get to that screen.
• Units of measurement may denote the “metric” value or the “scientific” value.
For example, “k” for kilo may denote “1000” or “1024”, “M” for mega may
denote “1000000” or “1048576” and so on.
• “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other
words”.
6
ZyWALL USG 50 User’s Guide
Document Conventions
Icons Used in Figures
Figures in this User’s Guide may use the following generic icons. The ZyWALL icon
is not an exact representation of your device.
ZyWALLComputerNotebook computer
ServerFirewallTelephone
SwitchRouter
ZyWALL USG 50 User’s Guide
7
Safety Warnings
• Do NOT use this product near water, for example, in a wet basement or near a swimming
pool.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT store things on the device.
• Do NOT install, use, or service this device during a thunderstorm. There is a remote risk
of electric shock from lightning.
• Connect ONLY suitable accessories to the device.
• Do NOT open the device or unit. Opening or removing covers can expose you to
dangerous high voltage points or other risks. ONLY qualified service personnel should
service or disassemble this device. Please contact your vendor for further information.
• Make sure to connect the cables to the correct ports.
• Place connecting cables carefully so that no one will step on them or stumble over them.
• Always disconnect all cables from this device before servicing or disassembling.
• Use ONLY an appropriate power adaptor or cord for your device. Connect it to the right
supply voltage (for example, 110V AC in North America or 230V AC in Europe).
• Do NOT remove the plug and connect it to a power outlet by itself; always attach the plug
to the power adaptor first before connecting it to a power outlet.
• Do NOT allow anything to rest on the power adaptor or cord and do NOT place the
product where anyone can walk on the power adaptor or cord.
• Do NOT use the device if the power adaptor or cord is damaged as it might cause
electrocution.
• If the power adaptor or cord is damaged, remove it from the device and the power
source.
• Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a
new one.
• Do not use the device outside, and make sure all the connections are indoors. There is a
remote risk of electric shock from lightning.
• CAUTION: RISK OF EXPLOSION IF BATTERY (on the motherboard) IS REPLACED BY AN
INCORRECT TYPE. DISPOSE OF USED BATTERIES ACCORDING TO THE INSTRUCTIONS.
Dispose them at the applicable collection point for the recycling of electrical and
electronic equipment. For detailed information about recycling of this product, please
contact your local city office, your household waste disposal service or the store where
you purchased the product.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your
device.
Safety Warnings
8
Your product is marked with this symbol, which is known as the WEEE mark. WEEE
stands for Waste Electronics and Electrical Equipment. It means that used electrical
and electronic products should not be mixed with general waste. Used electrical and
electronic equipment should be treated separately.
This chapter gives an overview of the ZyWALL. It explains the front panel ports,
LEDs, introduces the management methods, and lists different ways to start or
stop the ZyWALL.
1.1 Overview and Key Default Settings
The ZyWALL is a comprehensive security device. Its flexible configuration helps
network administrators set up the network and enforce security policies efficiently.
In addition, the ZyWALL provides excellent throughput, making it an ideal solution
for reliable, secure service.
The ZyWALL’s security features include VPN, firewall, anti-virus, content filtering,
IDP (Intrusion Detection and Prevention), ADP (Anomaly Detection and
Protection), and certificates. It also provides bandwidth management, Instant
Messaging (IM) and Peer to Peer (P2P) control, NAT, port forwarding, policy
routing, DHCP server and many other powerful features. Flexible configuration
helps you set up the network and enforce security policies efficiently. See Chapter
2 on page 37 for a more detailed overview of the ZyWALL’s features.
The ZyWALL provides ex cellent throughput with the reliability of dual WAN Gigabit
Ethernet ports and load balancing.You can also use a 3G cellular USB (not
included) for a third WAN connection.
The ZyWALL lets you set up multiple networks for your company. The DeMilitarized Zone (DMZ) increases LAN security by providing separate ports for
connecting publicly accessible servers. The ZyWALL also provides two separate
LAN networks. Y ou can set ports to be part of the LAN1, or DMZ. Alternatively, you
can deploy the ZyWALL as a transparent firewall in an existing network with
minimal configuration.
ZyWALL USG 50 User’s Guide
31
Chapter 1 Introducing the ZyWALL
1.2 Rack-mounted Installation
The ZyWALL can be mounted on an EIA standard size, 19-inch rack or in a wiring
closet with other equipment. Follow the steps below to mount your ZyWALL on a
standard EIA rack using a rack-mounting kit. Make sure the rack will safely
support the combined weight of all the equipment it contains and that the position
of the ZyWALL does not make the rack unstable or top-heavy. Take all necessary
precautions to anchor the rack securely before installing the unit.
Note: Leave 10 cm of clearance at the sides and 20 cm in the rear.
Use a #2 Phillips screwdriver to install the screws.
Note: Failure to use the proper screws may damage the unit.
1.2.1 Rack-Mounted Installation Procedure
1Align one bracket with the holes on one side of the Z yW ALL and secure it with the
included bracket screws (smaller than the rack-mounting screws).
2Attach the other bracket in a similar fashion.
Figure 1 Attaching Mounting Brackets and Screws
32
ZyWALL USG 50 User’s Guide
Chapter 1 Introducing the ZyWALL
3After attaching both mounting brackets, position the ZyWALL in the rack by lining
up the holes in the brackets with the appropriate holes on the rack. Secure the
ZyWALL to the rack with the rack-mounting screws.
Figure 2 Rack Mounting
1.3 Front Panel
This section introduces the ZyWALL’s front panel.
Figure 3 ZyWALL Front Panel
1.3.1 Front Panel LEDs
The following table describes the LEDs.
Table 1 Front Panel LEDs
LEDCOLOR STATUSDESCRIPTION
PWROffThe ZyWALL is turned off.
GreenOnThe ZyWALL is turned on.
RedOnThere is a hardware component failure. Shut down
Breathing The ZyWALL is in power saving mode.
the device, wait for a few minutes and then restart
the device (see Section 1.5 on page 35). If the LED
turns red again, then please contact your vendor.
ZyWALL USG 50 User’s Guide
33
Chapter 1 Introducing the ZyWALL
Table 1 Front Panel LEDs (continued)
LEDCOLOR STATUSDESCRIPTION
SYSGreenOffThe ZyWALL is not ready or has failed.
OnThe ZyWALL is ready and running.
BlinkingThe ZyWALL is booting.
RedOnThe ZyWALL had an error or has failed.
1, 2 ...GreenOffThere is no traffic on this port.
BlinkingThe ZyWALL is sending or receiving packets on this
port.
OrangeOffThere is no connection on this port.
OnThis port has a successful link.
1.4 Management Overview
You can use the following ways to manage the ZyWALL.
Web Configurator
The Web Configurator allows easy ZyWALL setup and management using an
Internet browser. This User’s Guide provides information about the Web
Configurator.
Figure 4 Managing the ZyWALL: Web Configurator
Command-Line Interface (CLI)
The CLI allows you to use text-based commands to configure the ZyWALL. You can
access it using remote management (for example, SSH or Telnet) or via the
console port. See the Command Reference Guide for more information about the
CLI.
34
ZyWALL USG 50 User’s Guide
Chapter 1 Introducing the ZyWALL
Console Port
You can use the console port to manage the ZyWALL using CLI commands. See
the Command Reference Guide for more information about the CLI.
The default settings for the console port are as follows.
Table 2 Console Port Default Settings
SETTINGVALUE
Speed115200 bps
Data Bits8
ParityNone
Stop Bit1
Flow ControlOff
1.5 Starting and Stopping the ZyWALL
Here are some of the ways to start and stop the ZyWAL L.
Always use Maintenance > Shutdown > Shut down or the shutdown
command before you turn off the ZyWALL or remove the power. Not
doing so can cause the firmware to become corrupt.
Table 3 Starting and Stopping the ZyWALL
METHODDESCRIPTION
Turning on the
power
Rebooting the
ZyWALL
Using the RESET
button
Clicking
Maintenance >
Shutdown >
Shutdown or
using the shutdown
command
Disconnecting the
power
A cold start occurs when you turn on the power to the ZyWA LL. The
ZyWALL powers up, checks the hardware, and starts the system
processes.
A warm start (without powering down and powering up again)
occurs when you use the Reboot button in the Reboot screen or
when you use the reboot command. The ZyWALL writes all cached
data to the local storage, stops the system processes, and then does
a warm start.
If you press the RESET button, the ZyWALL sets the configuration
to its default values and then reboots.
Clicking Maintenance > Shutdown > Shutdown or using the
shutdown command writes all cached data to the local storage and
stops the system processes. Wait for the device to shut down and
then manually turn off or remove the power. It does not turn off the
power.
Power off occurs when you turn off the power to the ZyWALL. The
ZyWALL simply turns off. It does not stop the system processes or
write cached data to local storage.
ZyWALL USG 50 User’s Guide
35
Chapter 1 Introducing the ZyWALL
The ZyWALL does not stop or start the system processes when you apply
configuration files or run shell scripts although you may temporarily lose access to
network resources.
36
ZyWALL USG 50 User’s Guide
CHAPTER 2
Features and Applications
This chapter introduces the main features and applications of the ZyWALL.
2.1 Features
The ZyWALL’s security features include VPN, firewall, anti-virus, content filtering,
IDP (Intrusion Detection and Prevention), ADP (Anomaly Detection and
Protection), and certificates. It also provides bandwidth management, NAT, port
forwarding, policy routing, DHCP server and many other powerful features.
The rest of this section provides more information about the features of the
ZyWALL.
High Availability
To ensure the ZyWALL provides reliable, secure Internet access, set up one or
more of the following:
• Multiple WAN ports and configure load balancing between these ports.
• One or more 3G (cellular) connections.
Virtual Private Networks (VPN)
Use IPSec, SSL to provide secure communication between two sites over the
Internet or any insecure network that uses TCP/IP for communication. The
ZyWALL also offers hub-and-spoke IPSec VPN.
Flexible Security Zones
Many security settings are made by zone, not by interface, port, or network. As a
result, it is much simpler to set up and to change security settings in the ZyWALL.
You can create y our own custom zones. You can add interfaces and VPN tunnels to
zones.
ZyWALL USG 50 User’s Guide
37
Chapter 2 Features and Applications
Firewall
The ZyWALL’ s firew all is a stateful inspection firew all. The Z yWALL rest ricts access
by screening data packets against defined access rules. It can also inspect
sessions. For example, traffic from one zone is not allowed unless it is ini tiated by
a computer in another zone first.
Intrusion Detection and Prevention (IDP)
IDP (Intrusion Detection and Protection) can detect malicious or suspicious
packets and respond instantaneously. It detects pattern-based attacks in order to
protect against network-based intrusions. See Section 30.6.2 on page 490 for a
list of attacks that the ZyWALL can protect against. You can also create your own
custom IDP rules.
Anomaly Detection and Prevention (ADP)
ADP (Anomaly Detection and Prevention) can detect malicious or suspicious
packets and respond instantaneously. It can detect:
• Anomalies based on violations of protocol standards (RFCs – Requests for
Comments)
• Abnormal flows such as port scans.
The ZyWALL’s ADP protects against network-based intrusions. See Section 31.3.4
on page 518 and Section 31.3.5 on page 521 for more on the kinds of attacks that
the ZyWALL can protect against. You can also create your own custom ADP rules.
Bandwidth Management
Bandwidth management allows you to allocate network resources according to
defined policies. This policy-based bandwidth allocation helps your network to
better handle applications such as Internet access, e-mail, Voice-over-IP (VoIP),
video conferencing and other business-critical applications.
Content Filter
Content filtering allows schools and businesses to create and enforce Internet
access policies tailored to the needs of the organization.
You can also subscribe to category-based content filtering that allows your
ZyWALL to check web sites against an external database of dynamically-updated
ratings of millions of web sites. You then simply select categories to block or
monitor, such as pornography or racial intolerance, from a pre-defined list.
38
ZyWALL USG 50 User’s Guide
Chapter 2 Features and Applications
Anti-Virus Scanner
With the anti-virus packet scanner, your ZyWALL scans files transmitting through
the enabled interfaces into the network. The ZyWALL helps stop threats at the
network edge before they reach the local host computers.
Anti-Spam
The anti-spam feature can mark or discard spam. Use the white list to identify
legitimate e-mail. Use the black list to identify spam e-mail. The ZyWALL can also
check e-mail against a DNS black list (DNSBL) of IP addresses of servers that are
suspected of being used by spammers.
Application Patrol
Application patrol (App. Patrol) manages instant messenger (IM), peer-to-peer
(P2P) applications like MSN and BitTorrent. You can even control the use of a
particular application’s individual features (like text messaging, voice, video
conferencing, and file transfers). Application patrol has powerful bandwidth
management including traffic prioritization to enhance the performance of delaysensitive applications like voice and video. You can also use an option that gives
SIP priority over all other traffic. This maximizes SIP traffic throughput for
improved VoIP call sound quality.
2.2 Applications
These are some example applications for your ZyWALL. See also Chapter 7 on
page 109 for configuration tutorial examples.
ZyWALL USG 50 User’s Guide
39
Chapter 2 Features and Applications
2.2.1 VPN Connectivity
Set up VPN tunnels with other companies, branch offices, telecommuters, and
business travelers to provide secure access to your network. You can also set up
additional connections to the Internet to provide better service.
Figure 5 Applications: VPN Connectivity
2.2.2 SSL VPN Network Access
You can configure the ZyWALL to provide SSL VPN network access to remote
users.
40
ZyWALL USG 50 User’s Guide
2.2.2.1 Full Tunnel Mode
In full tunnel mode, a virtual connection is created for remote users with private
IP addresses in the same subnet as the local network. This allows them to access
network resources in the same way as if they were part of the internal network.
Figure 6 Network Access Mode: Full Tunnel Mode
192.168.1.100
Chapter 2 Features and Applications
https;//
LAN (192.168.1.X)
Web MailFile Share
Web-based Application
Non-Web
Application
Server
ZyWALL USG 50 User’s Guide
41
Chapter 2 Features and Applications
2.2.3 User-Aware Access Control
Set up security policies that restrict access to sensitive information and shared
resources based on the user who is trying to access it.
Figure 7 Applications: User-Aware Access Control
2.2.4 Multiple WAN Interfaces
Set up multiple connections to the Internet on the same port, or set up multiple
connections on different ports. In either case, you can balance the loads between
them.
Figure 8 Applications: Multiple WAN Interfaces
42
ZyWALL USG 50 User’s Guide
CHAPTER 3
Web Configurator
The ZyWALL Web Configurator allows easy ZyWALL setup and management using
an Internet browser.
3.1 Web Configurator Requirements
In order to use the Web Configurator, you must
• Use Internet Explorer 7 or later, or Firefox 1.5 or later
• Allow pop-up windows (blocked by default in Windows XP Service Pack 2)
• Enable JavaScripts (enabled by default)
• Enable Java permissions (enabled by default)
• Enable cookies
The recommended screen resolution is 1024 x 768 pixels.
3.2 Web Configurator Access
1Make sure your ZyWALL hardware is properly connected. See the Quick Start
Guide.
ZyWALL USG 50 User’s Guide
43
Chapter 3 Web Configurator
2Open your web browser, and go to http://192.168.1.1. By default, the ZyWALL
automatically routes this request to its HTTPS server, and it is recommended to
keep this setting. The Login screen appears.
Figure 9 Login Screen
3Type the user name (default: “admin”) and password (default: “1234”).
If your account is configured to use an ASAS auth entication server, use the OTP
(One-Time Password) token to generate a number. Enter it in the One-Time Password field. The number is only good for one login. You must use the token to
generate a new number the next time you log in.
4Click Login. If you logged in using the default user name and password, the
Update Admin Info screen (Figure 10 on page 44) appears. Otherwise, the
dashboard (Figure 11 on page 45) appears.
Figure 10 Update Admin Info Screen
44
ZyWALL USG 50 User’s Guide
B
Chapter 3 Web Configurator
5The screen above appears every time you log in using the default user name and
default password. If you change the password for the default user account, this
screen does not appear anymore.
Follow the directions in this screen. If you change the default password, the Login
screen (Figure 9 on page 44) appears after you click Apply. If you click Ignore,
the Installation Setup Wizard opens if the ZyWALL is using its default
configuration (see Chapter 4 on page 59); otherwise the dashboard appears as
shown next.
Figure 11 Dashboard
A
C
3.3 Web Configurator Screens Overview
The Web Configurator screen is di vided into these parts (as illustr ated in Figure 11
on page 45):
• A - title bar
• B - navigation panel
• C - main window
3.3.1 Title Bar
The title bar provides some icons in the upper right corner.
Figure 12 Title Bar
ZyWALL USG 50 User’s Guide
45
Chapter 3 Web Configurator
The icons provide the following functions.
Table 4 Title Bar: Web Configurator Icons
LABELDESCRIPTION
LogoutClick this to log out of the Web Configurator.
HelpClick this to open the help page for the current screen.
AboutClick this to display basic information about the ZyWALL.
Site MapClick this to see an overview of links to the Web Configurator screens.
Object
Reference
ConsoleClick this to open the console in which you can use the command line
CLIClick this to open a popup window that displays the CLI commands sent
3.3.1.1 About
Click this to display basic information about the ZyWALL.
Click this to open a screen where you can check which configuration
items reference an object.
interface (CLI). See the CLI Reference Guide for details on the
commands.
by the Web Configurator.
Figure 13 Title Bar
The following table describes labels that can appear in this screen.
Table 5 Title Bar: Web Configurator Icons
LABELDESCRIPTION
Boot ModuleThis shows the version number of the software that handles the booting
process of the ZyWALL.
Current
Version
Released DateThis shows the date (yyyy-mm-dd) and time (hh:mm:ss) when the
OKClick this to close the screen.
This shows the firmware version of the ZyWALL.
firmware is released.
46
ZyWALL USG 50 User’s Guide
3.3.2 Navigation Panel
Use the menu items on the navigation panel to open screens to configure Z yW ALL
features. Click the arrow in the middle of the right edge of the navigation panel to
hide the navigation panel menus or drag it to resize them. The following sections
introduce the ZyWALL’s navigation panel menus and their screens.
Figure 14 Navigation Panel
Chapter 3 Web Configurator
3.3.2.1 Dashboard
The dashboard displays general device information, system status, system
resource usage, licensed service status, and interface status in widgets that you
can re-arrange to suit your needs. See Chapter 8 on page 157 for details on the
dashboard.
3.3.2.2 Monitor Menu
The monitor menu screens display status and statistics information.
Table 6 Monitor Menu Screens Summary
FOLDER OR LINKTABFUNCTION
System Status
Port StatisticsDisplays packet statistics for each physical port.
Interface StatusDisplays general interface information and packet
Traffic StatisticsCollect and display traffic statistics.
Session MonitorDisplays the status of all current sessions.
DDNS StatusDisplays the status of the ZyWALL’s DDNS domain names.
IP/MAC BindingLists the devices that have received an IP address from
Login UsersLists the users currently logged into the ZyWALL.
Cellular StatusDisplays details about the ZyWALL’ s 3G connection status.
statistics.
ZyWALL interfaces using IP/MAC binding.
ZyWALL USG 50 User’s Guide
47
Chapter 3 Web Configurator
Table 6 Monitor Menu Screens Summary (continued)
FOLDER OR LINKTABFUNCTION
AppPatrol StatisticsDisplays bandwidth and protocol statistics.
VPN Monitor
IPSecDisplays and manages the active IPSec SAs.
SSLLists users currently logged into the VPN SSL client portal.
Anti-X Statistics
Anti-VirusCollect and display statistics on the viruses that the
IDPCollect and display statistics on the intrusions that the
Content FilterReportCollect and display content filter statistics
Anti-SpamReportCollect and display spam statistics.
LogLists log entries.
You can also log out individual users and delete related
session information.
ZyWALL has detected.
ZyWALL has detected.
CacheManage the ZyWALL’s URL cache.
StatusDisplays how many mail sessions the ZyWALL is currently
checking and DNSBL (Domain Name Service-based spam
Black List) statistics.
3.3.2.3 Configuration Menu
Use the configuration menu screens to configure the ZyWALL’s features.
Table 7 Configuration Menu Screens Summary
FOLDER OR
LINK
Quick SetupQuickly configure WAN interfaces or VPN
Licensing
RegistrationRegistrationRegister the device and activate trial services.
Signature
Update
Network
TABFUNCTION
ServiceView the licensed service status and upgrade
Anti-VirusUpdate anti-virus signatures immediately or by a
IDP/AppPatrolUpdate IDP signatures immediately or by a
System ProtectUpdate system-protect signatures immediately or
connections.
licensed services.
schedule.
schedule.
by a schedule.
48
ZyWALL USG 50 User’s Guide
Chapter 3 Web Configurator
Table 7 Configuration Menu Screens Summary (continued)
FOLDER OR
LINK
InterfacePort RoleUse this screen to set the ZyWALL’s flexible ports
RoutingPolicy RouteCreate and manage routing policies.
ZoneConfigure zones used to define various policies.
DDNSProfileDefine and manage the ZyWALL’s DDNS domain
NATSet up and manage port forwarding rules.
HTTP RedirectSet up and manage HTTP redirection rules.
ALGConfigure SIP, H.323, and FTP pass-through
IP/MAC
Binding
Auth. PolicyDefine rules to force user authentication.
FirewallFirewallCreate and manage level-3 traffic rules.
VPN
IPSec VPNVPN ConnectionConfigure IPSec tunnels.
SSL VPNAccess PrivilegeConfigure SSL VPN access rights for users and
TABFUNCTION
as LAN1 or DMZ.
EthernetManage Ethernet interfaces and virtual Ethernet
interfaces.
PPPCreate and manage PPPoE and PPTP interfaces.
CellularConfigure a cellular Internet connection for an
installed 3G card.
VLANCreate and manage VLAN interfaces and virtual
VLAN interfaces.
BridgeCreate and manage bridges and virtual bridge
interfaces.
TrunkCreate and manage trunks (groups of interfaces)
for load balancing and link High Availability (HA).
Static RouteCreate and manage IP static routing information.
RIPConfigure device-level RIP settings.
OSPFConfigure device-level OSPF settings, including
areas and virtual links.
names.
settings.
SummaryConfigure IP to MAC address bindings for devices
connected to each supported interface.
Exempt ListConfigure ranges of IP addresses to which the
ZyWALL does not apply IP/MAC binding.
Session LimitLimit the number of concurrent client NAT/firewall
sessions.
VPN GatewayConfigure IKE tunnels.
groups.
Global SettingConfigure the ZyWALL’s SSL VPN settings that
apply to all connections.
ZyWALL USG 50 User’s Guide
49
Chapter 3 Web Configurator
Table 7 Configuration Menu Screens Summary (continued)
FOLDER OR
LINK
AppPatrolGeneralEnable or disable traffic management by
Anti-X
Anti-Virus GeneralTurn anti-virus on or off, set up anti-virus policies
IDPGeneralDisplay and manage IDP bindings.
ADPGeneralDisplay and manage ADP bindings.
Content FilterGeneralCreate and manage content filter policies.
Anti-SpamGeneralTurn anti-spam on or off and manage anti-spam
Object
User/GroupUserCreate and manage users.
AddressAddressCreate and manage host, range, and network
TABFUNCTION
application and see registration and signature
information.
CommonManage traffic of the most commonly used web,
file transfer and e-mail protocols.
IMManage instant messenger traffic.
Peer to PeerManage peer-to-peer traffic.
VoIPManage VoIP traffic.
StreamingManage streaming traffic.
Other Manage other kinds of traffic.
and check the anti-virus engine type and the anti-
virus license and signature status.
Black/White List Set up anti-virus black (blocked) and white
(allowed) lists of virus file patterns.
SignatureSearch for signatures by signature name or
attributes and configure how the ZyWALL uses
them.
ProfileCreate and manage IDP profiles.
Custom
Signatures
ProfileCreate and manage ADP profiles.
Filter ProfileCreate and manage the detailed filtering rules for
Black/White List Set up a black list to identify spam and a white list
DNSBLHave the ZyWALL check e-mail against DNS Black
GroupCreate and manage groups of users.
SettingManage default settings for all users, general
Address GroupCreate and manage groups of addresses.
Create, import, or export custom signatures.
content filtering policies.
policies.
to identify legitimate e-mail.
Lists.
settings for user sessions, and rules to force user
authentication.
(subnet) addresses.
50
ZyWALL USG 50 User’s Guide
Chapter 3 Web Configurator
Table 7 Configuration Menu Screens Summary (continued)
FOLDER OR
LINK
ServiceServiceCreate and manage TCP and UDP services.
ScheduleCreate one-time and recurring schedules.
AAA ServerActive Directory-
Auth. MethodCreate and manage ways of authenticating users.
CertificateMy CertificatesCreate and manage the ZyWALL’s certificates.
ISP AccountCreate and manage ISP account information for
SSL
Application
Endpoint
Security
System
Host NameConfigure the system and domain name for the
Date/TimeConfigure the current date, time, and time zone in
Console
Speed
DNSConfigure the DNS server and address records for
WWWService ControlConfigure HTTP, HTTPS, and general
SSHConfigure SSH server and SSH service settings.
TELNETConfigure telnet server settings for the ZyWALL.
FTPConfigure FTP server settings.
SNMPConfigure SNMP communities and services.
Vantage CNMConfigure and allow your ZyWALL to be managed
LanguageSelect the Web Configurator language.
Log & Report
TABFUNCTION
Service GroupCreate and manage groups of services.
Configure the default Active Directory settings.
Default
Active DirectoryGroup
LDAP-DefaultConfigure the default LDAP settings.
LDAP-GroupCreate and manage groups of LDAP servers.
RADIUS-DefaultConfigure the default RADIUS settings.
RADIUS-GroupCreate and manage groups of RADIUS servers.
Trusted
Certificates
Login PageConfigure how the login and access user screens
Create and manage groups of Active Directory
servers.
Import and manage certificates from trusted
sources.
PPPoE/PPTP interfaces.
Create SSL web application objects.
Create Endpoint Security (EPS) objects.
ZyWALL.
the ZyWALL.
Set the console speed.
the ZyWALL.
authentication.
look.
by the Vantage CNM server.
ZyWALL USG 50 User’s Guide
51
Chapter 3 Web Configurator
Table 7 Configuration Menu Screens Summary (continued)
FOLDER OR
LINK
Email Daily
Report
Log SettingConfigure the system log, e-mail logs, and remote
TABFUNCTION
3.3.2.4 Maintenance Menu
Use the maintenance menu screens to manage configuration and firmware files,
run diagnostics, and reboot or shut down the ZyWALL.
RebootRestart the ZyWALL.
ShutdownTurn off the ZyWALL.
TABFUNCTION
File
Firmware
Package
Shell ScriptManage and run shell script files for the ZyWALL.
Packet CaptureCapture packets for analysis.
Configure where and how to send daily reports and
what reports to send.
syslog servers.
Manage and upload configuration files for the
ZyWALL.
View the current firmware version and to upload
firmware.
3.3.3 Main Window
The main window shows the screen you select in the navigation panel. The main
window screens are discussed in the rest of this document.
Right after you log in, the Dashboard screen is display ed. See Chapter 8 on page
157 for more information about the Dashboard screen.
3.3.3.1 Warning Messages
Warning messages, such as those resulting from misconfiguration, display in a
popup window.
Figure 15 Warning Message
52
ZyWALL USG 50 User’s Guide
3.3.3.2 Site Map
Click Site MAP to see an overview of links to the Web Configurator screens. Click
a screen’s link to go to that screen.
Figure 16 Site Map
Chapter 3 Web Configurator
3.3.3.3 Object Reference
Click Object Ref erence to open the Object Reference screen. Select the type of
object and the individual object and click Refresh to show which configuration
settings reference the object. The following example shows which configuration
settings reference the ldap-users user object (in this case the first firewall rule).
Figure 17 Object Reference
ZyWALL USG 50 User’s Guide
53
Chapter 3 Web Configurator
The fields vary with the type of object. The following table describes labels that
can appear in this screen.
Table 9 Object References
LABELDESCRIPTION
Object NameThis identifies the object for which the configuration settings that use it
#This field is a sequential value, and it is not associated with any entry.
ServiceThis is the type of setting that references the selected object. Click a
PriorityIf it is applicable, this field lists the referencing configuration item’s
NameThis field identifies the configuration item that references the object.
DescriptionIf the referencing configuration item has a description configured, it
RefreshClick this to update the information in this screen.
CancelClick Cancel to close the screen.
are displayed. Click the object’s name to display the object’s
configuration screen in the main window.
service’s name to display the service’s configuration screen in the main
window.
position in its list, otherwise N/A displays.
displays here.
3.3.3.4 CLI Messages
Click CLI to look at the CLI commands sent by the Web Configurator. The se
commands appear in a popup window, such as the following.
Figure 18 CLI Messages
Click Clear to remove the currently displayed information.
See the Command Reference Guide for information about the commands.
3.3.4 Tables and Lists
The Web Configurator tables and lists are quite flexible and provide several
options for how to display their entries.
54
ZyWALL USG 50 User’s Guide
3.3.4.1 Manipulating Table Display
Here are some of the ways you can manipulate the We b Configurator tables.
1Click a column heading to sort the table’s entries according to that column’s
criteria.
Figure 19 Sorting Table Entries by a Column’s Criteria
2Click the down arrow next to a column heading for more options about how to
display the entries. The options available vary depending on the type of fields in
the column. Here are some examples of what you can do:
Chapter 3 Web Configurator
• Sort in ascending alphabetical order
• Sort in descending (reverse) alphabetical order
• Select which columns to display
• Group entries by field
• Show entries in groups
• Filter by mathematical operators (<, >, or =) or searching for text
Figure 20 Common Table Column Options
ZyWALL USG 50 User’s Guide
55
Chapter 3 Web Configurator
3Select a column heading cell’s right border and drag to re-size the column.
Figure 21 Resizing a Table Column
4Select a column heading and drag and drop it to change the column order. A green
check mark displays next to the column’s title when you drag the column to a valid
new location.
Figure 22 Changing the Column Order
5Use the icons and fields at the bottom of the table to navigate to different pages of
entries and control how many entries display at a time.
Figure 23 Navigating Pages of Table Entries
56
ZyWALL USG 50 User’s Guide
3.3.4.2 Working with Table Entries
The tables have icons for working with table entries. A sample is shown next. You
can often use the [Shift] or [Ctrl] ke y t o sel e c t multiple entries to remove,
activate, or deactivate.
Figure 24 Common Table Icons
Here are descriptions for the most common table icons.
Table 10 Common Table Icons
LABELDESCRIPTION
AddClick this to create a new entry. For features where the entry’s
position in the numbered list is important (features where the
ZyWALL applies the table’s entries in order like the firewall for
example), you can select an entry and click Add to create a new
entry after the selected entry.
EditDouble-click an entry or select it and click Edit to open a screen
where you can modify the entry’s settings. In some tables you can
just click a table entry and edit it directly in the table. For those types
of tables small red triangles display for table entries with changes
that you have not yet applied.
RemoveTo remove an entry, select it and click Remove. The ZyWALL
confirms you want to remove it before doing so.
ActivateTo turn on an entry, select it and click Activate.
InactivateTo turn off an entry, select it and click Inactivate.
ConnectTo connect an entry, select it and click Connect.
DisconnectTo disconnect an entry, select it and click Disconnect.
Object References Select an entry and click Object References to open a screen that
shows which settings use the entry. See Section 11.3.2 on page 230
for an example.
MoveTo change an entry’s position in a numbered list, select it and click
Move to display a field to type a number for where you want to put
that entry and press [ENTER] to move the entry to the number that
you typed. For example, if you type 6, the entry you are moving
becomes number 6 and the previous entry 6 (if there is one) gets
pushed up (or down) one.
Chapter 3 Web Configurator
3.3.4.3 Working with Lists
When a list of available entries displays next to a list of selected entries, you can
often just double-click an entry to move it from one list to the other. In some lists
ZyWALL USG 50 User’s Guide
57
Chapter 3 Web Configurator
you can also use the [Shift] or [Ctrl] key to select multiple entries, and then use
the arrow button to move them to the other list.
Figure 25 Working with Lists
58
ZyWALL USG 50 User’s Guide
CHAPTER 4
Installation Setup Wizard
4.1 Installation Setup Wizard Screens
If you log into the Web Configurator when the ZyWALL is using its default
configuration, the first Installation Setup Wizard screen displays. This wizard
helps you configure Internet connection settings and activate subscription
services. This chapter provides information on configuring the Web Configurator's
installation setup wizard. See the feature-specific chapters in this User’ s Guide for
background information.
Figure 26 Installation Setup Wizard
• Click the double arrow in the upper right corner to display or hide the help.
•Click Go to Dashboard to skip the installation setup wizard or click Next to
start configuring for Internet access.
4.1.1 Internet Access Setup - WAN Interface
Use this screen to set how many WAN interfaces to configure and the first WAN
interface’s type of encapsulation and method of IP address assignment.
ZyWALL USG 50 User’s Guide
59
Chapter 4 Installation Setup Wizard
The screens vary depending on the encapsulation type. Refer to information
provided by your ISP to know what to enter in each field. Leave a field blank if you
don’t have that information.
Note: Enter the Internet access information exactly as your ISP gave it to you.
Figure 27 Internet Access: Step 1
• I have two ISPs: Select this option to configure two Internet connections.
Leave it cleared to configure just one. This option appears when you are
configuring the first WAN interface.
• Encapsulation: Choose the Ethernet option when the WAN port is used as a
regular Ethernet. Otherwise, choose PPPoE or PPTP for a dial-up connection
according to the information from your ISP.
• WAN Interface: This is the interface you are configuring for Internet access.
• Zone: This is the security zone to which this interface and Internet connection
belong.
• IP Address Assignment: Select Auto if your ISP did not assign you a fix ed IP
address.
Select Static if the ISP assigned a fixed IP address.
4.1.2 Internet Access: Ethernet
This screen is read-only if you set the previous screen’ s IP Address Assignment
field to Auto. Use this screen to configure your IP address settings.
60
ZyWALL USG 50 User’s Guide
Chapter 4 Installation Setup Wizard
Note: Enter the Internet access information exactly as given to you by your ISP.
Figure 28 Internet Access: Ethernet Encapsulation
• Encapsulation: This displays the type of Internet connection you are
configuring.
• First WAN Interface: This is the number of the interface that will connect with
your ISP.
• Zone: This is the security zone to which thi s int erface and Internet connection
will belong.
• IP Address: Enter your (static) public IP address. Auto d isplays if y ou selected Auto as the IP Address Assignment in the previous screen.
The following fields display if you selected static IP address assignment.
• IP Subnet Mask: Enter the subnet mask for this WAN connection's IP address.
• Gateway IP Address: Enter the IP address of the router through which this
WAN connection will send traffic (the default gateway).
• First / Second DNS Server: These fields display if you selected static IP
address assignment. The Domain Name System (DNS) maps a domain name to
an IP address and vice versa. Enter a DNS server's IP address(es). The DNS
server is extremely important because without it, you must know the IP address
of a computer before you can access it. The ZyWALL uses these (in the order
you specify here) to resolve domain names for VPN, DDNS and the time server.
Leave the field as 0.0.0.0 if you do not want to configure DNS servers.
ZyWALL USG 50 User’s Guide
61
Chapter 4 Installation Setup Wizard
4.1.3 Internet Access: PPPoE
Note: Enter the Internet access information exactly as given to you by your ISP.
Figure 29 Internet Access: PPPoE Encapsulation
4.1.3.1 ISP Parameters
• T ype the PPP oE Service Name from your service provider. PPPoE uses a service
name to identify and reach the PPPoE server. You can use alphanumeric and _@$./ characters, and it can be up to 64 characters long.
• Authentication Type - Select an authentication protocol for outgoing
connection requests. Options are:
• CHAP/PAP - Your ZyWALL accepts either CHAP or PAP when requested by
the remote node.
• CHAP - Your ZyWALL accepts CHAP only.
• PAP - Your ZyWALL accepts PAP only.
• MSCHAP - Your ZyWALL accepts MSCHAP only.
• MSCHAP-V2 - Your ZyWALL accepts MSCHAP-V2 only.
• Type the User Name given to you by your ISP. You can use alphanumeric and _@$./ characters, and it can be up to 31 characters long.
• Type the Password associated with the user name. Use up to 64 ASCII
characters except the [] and ?. This field can be blank.
• Select Nailed-Up if you do not want the connection to time out. Otherwise,
type the Idle Timeout in seconds that elapses before the router automatically
disconnects from the PPPoE server.
62
ZyWALL USG 50 User’s Guide
4.1.3.2 WAN IP Address Assignments
• WAN Interface: This is the name of the interface that wi ll co n nect with your
ISP.
• Zone: This is the security zone to which thi s int erface and Internet connection
will belong.
• IP Address: Enter your (static) public IP address. Auto d isplays if y ou selected Auto as the IP Address Assignment in the previous screen.
• First / Second DNS Server: These fields display if you selected static IP
address assignment. The Domain Name System (DNS) maps a domain name to
an IP address and vice versa. Enter a DNS server's IP address(es). The DNS
server is extremely important because without it, you must know the IP address
of a computer before you can access it. The ZyWALL uses these (in the order
you specify here) to resolve domain names for VPN, DDNS and the time server.
Leave the field as 0.0.0.0 if you do not w ant to configure DNS servers. If y ou do
not configure a DNS server, you must know the IP address of a machine in order
to access it.
4.1.4 Internet Access: PPTP
Chapter 4 Installation Setup Wizard
Note: Enter the Internet access information exactly as given to you by your ISP.
Figure 30 Internet Access: PPTP Encapsulation
ZyWALL USG 50 User’s Guide
63
Chapter 4 Installation Setup Wizard
4.1.5 ISP Parameters
• Authentication Type - Select an authentication protocol for outgoing calls.
Options are:
• CHAP/PAP - Your ZyWALL accepts either CHAP or PAP when requested by
the remote node.
• CHAP - Your ZyWALL accepts CHAP only.
• PAP - Your ZyWALL accepts PAP only.
• MSCHAP - Your ZyWALL accepts MSCHAP only.
• MSCHAP-V2 - Your ZyWALL accepts MSCHAP-V2 only.
• Type the User Name given to you by your ISP. You can use alphanumeric and _@$./ characters, and it can be up to 31 characters long.
• Type the Password associated with the user name. Use up to 64 ASCII
characters except the [] and ?. This field can be blank. Re-type y our password in
the next field to confirm it.
• Select Nailed-Up if you do not want the connection to time out. Otherwise,
type the Idle Timeout in seconds that elapses before the router automatically
disconnects from the PPTP server.
4.1.5.1 PPTP Configuration
• Base Interface: This identifies the Ethernet interface you configure to connect
with a modem or router.
•Type a Base IP Address (static) assigned to you by your ISP.
• Type the IP Subnet Mask assigned to you by your ISP (if given).
• Server IP: Type the IP address of the PPTP server.
•Type a Connection ID or connection name. It must follow the “c:id” and
“n:name” format. For example, C:12 or N:My ISP. This field is optional and
depends on the requirements of your broadband modem or router. You can use
alphanumeric and -_: characters, and it can be up to 31 characters long.
4.1.5.2 WAN IP Address Assignments
• First WAN Interface: This is the connection type on the interface you are
configuring to connect with your ISP.
• Zone This is the security zone to whic h thi s in terface and Internet connection
will belong.
• IP Address: Enter your (static) public IP address. Auto displays if you selected
Auto as the IP Address Assignment in the previous screen.
• First / Second DNS Server: These fields display if you selected static IP
address assignment. The Domain Name System (DNS) maps a domain name to
an IP address and vice versa. Enter a DNS server's IP address(es). The DNS
server is extremely important because without it, you must know the IP address
of a computer before you can access it. The ZyWALL uses these (in the order
you specify here) to resolve domain names for VPN, DDNS and the time server.
Leave the field as 0.0.0.0 if you do not want to configure DNS servers.
64
ZyWALL USG 50 User’s Guide
Chapter 4 Installation Setup Wizard
4.1.6 Internet Access Setup - Second WAN Interface
If you selected I have two ISPs, after you configure the First WAN Interface,
you can configure the Second WAN Interface. The screens for configuring the
second WAN interface are similar to the first (see Section 4.1.1 on page 59).
Figure 31 Internet Access: Step 3: Second WAN Interface
ZyWALL USG 50 User’s Guide
65
Chapter 4 Installation Setup Wizard
4.1.7 Internet Access - Finish
You have set up your ZyWALL to access the Internet. After configuring the WAN
interface(s), a screen displays with your settings. If they are not correct, click
Back.
Figure 32 Internet Access: Ethernet Encapsulation
Note: If you have not already done so, you can register your ZyWALL with
myZyXEL.com and activate trials of services like Content Filter.
Click Next and use the following screen to perform a basic registration (see
Section 4.2 on page 66). If you want to do a more detailed registration or manage
your account details, click myZyXEL.com.
Alternatively, close the window to exit the wizard.
4.2 Device Registration
Use this screen to register your ZyWALL with myZXEL.com and activate trial
periods of subscription security features if you have not already done so. If the
ZyWALL is already registered this screen displays your user name and which trial
services are activated (if any). You can still activate any un-activated trial
services.
Note: You must be connected to the Internet to register.
66
ZyWALL USG 50 User’s Guide
Chapter 4 Installation Setup Wizard
Use the Registration > Service screen to update your service subscription
status.
Registration
• Select new myZyXEL.com account if you haven’t created an account at
myZyXEL.com, select this option and configure the following fields to create an
account and register your ZyWALL.
• Select existing myZyXEL.com account if you already have an account at
myZyXEL.com and enter your user name and password in the fields below to
register your ZyWALL.
•Enter a User Name for your myZyXEL.com account. Use from six to 20
alphanumeric characters (and the underscore). Spaces are not allowed. Click
Check to verify that it is available.
• Password: Use six to 20 alphanumeric characters (and the underscore).
Spaces are not allowed. Type it again in the Confirm Password field.
• E-Mail Address: Enter your e-mail address. Use up to 80 alphanumeric
characters (periods and the underscore are also allowed) without spaces.
• Country Code: Select your country from the drop-down box list.
ZyWALL USG 50 User’s Guide
67
Chapter 4 Installation Setup Wizard
• Trial Service Activation: You can try a trial service subscription. The trial
period starts the day you activate the trial. After the trial expires, you can buy
an iCard and enter the license key in the Registration > Service screen to
extend the service.
Figure 33 Registraton: Registered Device
68
ZyWALL USG 50 User’s Guide
CHAPTER 5
Quick Setup
5.1 Quick Setup Overview
The Web Configurator's quick setup wizards help you configure Internet and VPN
connection settings. This chapter provides information on configuring the quick
setup screens in the Web Configurator. See the feature-specific chapters in this
User’s Guide for background information.
In the Web Configurator, click Configuration > Quick Setup to open the first
Quick Setup screen.
Figure 34 Quick Setup
• WAN Interface
Click this link to open a wizard to set up a WAN (Internet) connection. This
wizard creates matching ISP account settings in the ZyWALL if you use PPPoE or
PPTP. See Section 5.2 on page 70.
•VPN SETUP
Use VPN SETUP to configure a VPN (Virtual Private Network) tunnel for a
secure connection to another computer or network. See Section 5.4 on page 76.
ZyWALL USG 50 User’s Guide
69
Chapter 5 Quick Setup
5.2 WAN Interface Quick Setup
Click WAN Interface in the main Quick Setup screen to open the WAN
Interface Quick Setup Wizard Welcome screen. Use these screens to configure an interface to connect to the internet. Click Next.
Figure 35 WAN Interface Quick Setup Wizard
5.2.1 Choose an Ethernet Interface
Select the Ethernet interface that you want to configure for a WAN connection and
click Next.
Figure 36 Choose an Ethernet Interface
5.2.2 Select WAN Type
70
WAN Type Selection: Select the type of encapsulation this connection is to use.
Choose Ethernet when the WAN port is used as a regular Ethernet.
ZyWALL USG 50 User’s Guide
Chapter 5 Quick Setup
Otherwise, choose PPPoE or PPTP for a dial-up connection according to the
information from your ISP.
Figure 37 WAN Interface Setup: Step 2
The screens vary depending on what encapsulation type you use. Refer to
information provided by your ISP to know what to enter in each field. Leave a field
blank if you don’t have that information.
Note: Enter the Internet access information exactly as your ISP gave it to you.
5.2.3 Configure WAN Settings
Use this screen to select whether the interface should use a fixed or dynamic IP
address.
Figure 38 WAN Interface Setup: Step 2
• WAN Interface: This is the interface you are configuring for Internet access.
• Zone: This is the security zone to which this interface and Internet connection
belong.
ZyWALL USG 50 User’s Guide
71
Chapter 5 Quick Setup
• IP Address Assignment: Select Auto If your ISP did not assign you a fixed IP
address.
Select Static If the ISP assigned a fixed IP address.
5.2.4 WAN and ISP Connection Settings
Use this screen to configure the ISP and WAN interface settings. This screen is
read-only if you set the IP Address Assignment to Static.
Note: Enter the Internet access information exactly as your ISP gave it to you.
Figure 39 WAN and ISP Connection Settings: (PPTP Shown)
72
The following table describes the labels in this screen.
Table 11 WAN and ISP Connection Settings
LABELDESCRIPTION
ISP Parameter This section appears if the interface uses a PPPoE or PPTP Internet
connection.
EncapsulationThis displays the type of Internet connection you are configuring.
ZyWALL USG 50 User’s Guide
Chapter 5 Quick Setup
Table 11 WAN and ISP Connection Settings (continued)
LABELDESCRIPTION
Authentication
Type
User NameType the user name given to you by your ISP. You can use
Password T ype the password associated with the user name above. Use up to 64
Retypeto
Confirm
Nailed-Up Select Nailed-Up if you do not want the connection to time out.
Idle TimeoutType the time in seconds that elapses before the router automatically
PPTP
Configuration
Base Interface This displays the identity of the Ethernet interface you configure to
Base IP
Address
IP Subnet
Mask
Server IPType the IP address of the PPTP server.
Connection ID Enter the connection ID or connection name in this field. It must
Use the drop-down list box to select an authentication protocol for
outgoing calls. Options are:
CHAP/PAP - Your ZyWALL accepts either CHAP or PAP when
requested by this remote node.
CHAP - Your ZyWALL accepts CHAP only.
PAP - Your ZyWALL accepts PAP only.
MSCHAP - Your ZyWALL accepts MSCHAP only.
MSCHAP-V2 - Your ZyWALL accepts MSCHAP-V2 only.
alphanumeric and -_
characters long.
ASCII characters except the [] and ?. This field can be blank.
Type your password again for confirmation.
disconnects from the PPPoE server. 0 means no timeout.
This section only appears if the interface uses a PPPoE or PPTP
Internet connection.
connect with a modem or router.
Type the (static) IP address assigned to you by your ISP.
Type the subnet mask assigned to you by your ISP (if given).
follow the "c:id" and "n:name" format. For example, C:12 or N:My
ISP.
This field is optional and depends on the requirements of your DSL
modem.
@$./ characters, and it can be up to 31
WAN Interface
Setup
WAN Interface This displays the identity of the interface you configure to connect
ZoneThis field displays to which security zone this interface and Internet
IP AddressThis field is read-only when the WAN interface uses a dynamic IP
ZyWALL USG 50 User’s Guide
You can use alphanumeric and -_
characters long.
with your ISP.
connection will belong.
address. If your WAN interface uses a static IP address, enter it in this
field.
: characters, and it can be up to 31
73
Chapter 5 Quick Setup
Table 11 WAN and ISP Connection Settings (continued)
LABELDESCRIPTION
First DNS
Server
Second DNS
Server
BackClick Back to return to the previous screen.
NextClick Next to continue.
These fields only display for an interface with a static IP address.
Enter the DNS server IP address(es) in the field(s) to the right.
Leave the field as 0.0.0.0 if you do not want to configure DNS
servers. If you do not configure a DNS server, you must know the IP
address of a machine in order to access it.
DNS (Domain Name System) is for mapping a domain name to its
corresponding IP address and vice versa. The DNS server is ex tremely
important because without it, you must know the IP address of a
computer before you can access it. The ZyWALL uses a system DNS
server (in the order you specify here) to resolve domain names for
VPN, DDNS and the time server.
5.2.5 Quick Setup Interface Wizard: Summary
This screen displays the WAN interface’s settings.
Figure 40 Interface Wizard: Summary WAN (PPTP Shown)
The following table describes the labels in this screen.
Table 12 Interface Wizard: Summary WAN
LABELDESCRIPTION
EncapsulationThis displays what encapsulation this interface uses to connect to the
Internet.
Service NameThis field is read-only and only appears for a PPPoE interface. It displays
the PPPoE service name specified in the ISP account.
Server IPThis field only appears for a PPTP interface. It displays the IP address of
the PPTP server.
74
ZyWALL USG 50 User’s Guide
Chapter 5 Quick Setup
Table 12 Interface Wizard: Summary WAN
LABELDESCRIPTION
User NameThis is the user name given to you by your ISP.
Nailed-Up If No displays the connection will not time out. Yes means the ZyWALL
uses the idle timeout.
Idle TimeoutThis is how many seconds the connection can be idle before the router
automatically disconnects from the PPPoE server. 0 means no timeout.
Connection IDIf you specified a connection ID, it displays here.
WAN InterfaceThis identifies the interface you configure to connect with your ISP.
ZoneThis field displays to which security zone this interface and Internet
connection will belong.
IP Address
Assignment
First DNS
Server
Second DNS
Server
CloseClick Close to exit the wizard.
This field displays whether the WAN IP address is static or dynamic
(Auto).
If the IP Address Assignment is Static, these fields display the DNS
server IP address(es).
5.3 VPN Quick Setup
Click VPN Setup in the main Quick Setup screen to open the VPN Setup
Wizard Welcome screen. The VPN wizard creates corresponding VPN connection
and VPN gateway settings and address objects that you can use later in
configuring more VPN connections or other features. Click Next.
Figure 41 VPN Quick Setup Wizard
ZyWALL USG 50 User’s Guide
75
Chapter 5 Quick Setup
5.4 VPN Setup Wizard: Wizard Type
A VPN (Virtual Private Network) tunnel is a secure connection to another computer
or network. Use this screen to select which type of VPN connection you want to
configure.
Figure 42 VPN Setup Wizard: Wizard Type
Express: Use this wizard to create a VPN connection with another ZLD-based
ZyWALL using a pre-shared key and default security settings.
Advanced: Use this wizard to configure det a i led V PN security settings such as
using certificates. The VPN connection can be to another ZLD-based ZyWALL or
other IPSec device.
76
ZyWALL USG 50 User’s Guide
5.5 VPN Express Wizard - Scenario
Click the Express radio button as shown in Figure 42 on page 76 to display the
following screen.
Figure 43 VPN Express Wizard: Step 2
Chapter 5 Quick Setup
Rule Name: Type the name used to identify this VPN connection (and VPN
gateway). Y ou may use 1-31 alphanumeric char acters, underscores (_), or dashes
(-), but the first character cannot be a number. This value is case-sensitive.
Select the scenario that best describes your intended VPN connection. The figure
on the left of the screen changes to match the scenario you select.
• Site-to-site - Choose this if the remote IPSec device has a static IP address or a
domain name. This ZyWALL can initiate the VPN tunnel.
• Site-to-site with Dynamic Peer - Choose this if the remote IPSec device has a
dynamic IP address. Only the remote IPSec device can initiate the VPN tunnel.
• Remote Access (Server Role) - Choose this to allow incoming connections from
IPSec VPN clients. The clients have dynamic IP addresses and are also known as
dial-in users. Only the clients can initiate the VPN tunnel.
• Remote Access (Client Role) - Choose this to connect to an IPSec server. This
ZyWALL is the client (dial-in user) and can initiate the VPN tunnel.
ZyWALL USG 50 User’s Guide
77
Chapter 5 Quick Setup
5.5.1 VPN Express Wizard - Configuration
Figure 44 VPN Express Wizard: Step 3
• Secure Gateway: If Any displays in this field, it is not configurable for the
chosen scenario. If this field is configurable, enter the WAN IP address or
domain name of the remote IPSec device (secure gateway) to identify the
remote IPSec router by its IP address or a domain name. Use 0.0.0.0 if the
remote IPSec router has a dynamic WAN IP address.
• Pre-Shared Key: Type the password. Both ends of the VPN tunnel must use
the same password. Use 8 to 31 case-sensitive ASCII characters or 8 to 31 pairs
of hexadecimal (“0-9”, “A-F”) characters. Proceed a hexadecimal key with “0x”.
You will receive a PYLD_MALFORMED (payload malformed) packet if the same
pre-shared key is not used on both ends.
• Local Policy (IP/Mask): Type the IP address of a computer on your network.
You can also specify a subnet. This must match the remote IP address
configured on the remote IPSec device.
• Remote Policy (IP/Mask): If Any displays in this field, it is not configurable
for the chosen scenario. If this field is configurable, type the IP address of a
computer behind the remote IPSec device. You can also specify a subnet. This
must match the local IP address configured on the remote IPSec device.
78
ZyWALL USG 50 User’s Guide
5.5.2 VPN Express Wizard - Summary
This screen provides a read-only summary of the VPN tunnel’s configuration and
also commands that you can copy and paste into another ZLD-based ZyWALL’s
command line interface to configure it.
Figure 45 VPN Express Wizard: Step 4
Chapter 5 Quick Setup
• Rule Name: Identifies the VPN gateway policy.
• Secure Gateway: IP address or domain name of the remote IPSec device. If
this field displays Any, only the remote IPSec device can initiate the VPN
connection.
• Pre-Shared Key: VPN tunnel password. It identifies a communicating party
during a phase 1 IKE negotiation.
• Local Policy: (Static) IP address and subnet mask of the computers on the
network behind your ZyWALL that can use the tunnel.
• Remote Policy: (Static) IP address and subnet mask of the computers on the
network behind the remote IPSec device that can use the tunnel. If this field
displays Any, only the remote IPSec device can initiate the VPN connection.
• Copy and paste the Configuration for Secure Gateway commands into
another ZLD-based ZyWALL’s command line interface to configure it to serve as
the other end of this VPN tunnel. You can also use a text editor to save these
commands as a shell script file with a “.zysh” filename extension. Then you can
use the file manager to run the script in order to configure the VPN connection.
See the commands reference guide for details on the commands displayed in
this list.
ZyWALL USG 50 User’s Guide
79
Chapter 5 Quick Setup
5.5.3 VPN Express Wizard - Finish
Now you can use the VPN tunnel.
Figure 46 VPN Express Wizard: Step 6
80
Note: If you have not already done so, use the myZyXEL.com link and register your
ZyWALL with myZyXEL.com and activate trials of services like Content Filter.
Click Close to exit the wizard.
ZyWALL USG 50 User’s Guide
5.5.4 VPN Advanced Wizard - Scenario
Click the Advanced radio button as shown in Figure 42 on page 76 to di splay the
following screen.
Figure 47 VPN Advanced Wizard: Scenario
Chapter 5 Quick Setup
Rule Name: Type the name used to identify this VPN connection (and VPN
gateway). Y ou may use 1-31 alphanumeric char acters, underscores (_), or dashes
(-), but the first character cannot be a number. This value is case-sensitive.
Select the scenario that best describes your intended VPN connection. The figure
on the left of the screen changes to match the scenario you select.
• Site-to-site - Choose this if the remote IPSec device has a static IP address or a
domain name. This ZyWALL can initiate the VPN tunnel.
• Site-to-site with Dynamic Peer - Choose this if the remote IPSec device has a
dynamic IP address. Only the remote IPSec device can initiate the VPN tunnel.
• Remote Access (Server Role) - Choose this to allow incoming connections from
IPSec VPN clients. The clients have dynamic IP addresses and are also known as
dial-in users. Only the clients can initiate the VPN tunnel.
ZyWALL USG 50 User’s Guide
81
Chapter 5 Quick Setup
• Remote Access (Client Role) - Choose this to connect to an IPSec server. This
ZyWALL is the client (dial-in user) and can initiate the VPN tunnel.
5.5.5 VPN Advanced Wizard - Phase 1 Settings
There are two phases to every IKE (Internet Key Exchange) negotiation – phase 1
(Authentication) and phase 2 (Key Exchange). A phase 1 exchange establ ishes an
IKE SA (Security Association).
Figure 48 VPN Advanced Wizard: Phase 1 Settings
• Secure Gateway: If Any displays in this field, it is not configurable for the
chosen scenario. If this field is configurable, enter the WAN IP address or
domain name of the remote IPSec device (secure gateway) to identify the
remote IPSec device by its IP address or a domain name. Use 0.0.0.0 if the
remote IPSec device has a dynamic WAN IP address.
• My Address (interface): Select an interface from the drop-down list box to
use on your ZyWALL.
• Negotiation Mode: Select Main for identity protection. Select Aggressive to
allow more incoming connections from dynamic IP addresses to use separate
passwords.
Note: Multiple SAs connecting through a secure gateway must have the same
negotiation mode.
• Encryption Algorithm: 3DES and AES use encryption. The longer the key, the
higher the security (this may affect throughput). Both sender and recei ver must
know the same secret key, which can be used to encrypt and decrypt the
message or to generate and verify a message authentication code. The DES
encryption algorithm uses a 56-bit key. Triple DES (3DES) is a variation on DES
82
ZyWALL USG 50 User’s Guide
Chapter 5 Quick Setup
that uses a 168-bit key. As a result, 3DES is more secure than DES. It also
requires more processing power, resulting in increased latency and decreased
throughput. AES128 uses a 128-bit key and is faster than 3DES. AES192 uses a
192-bit key and AES256 uses a 256-bit key.
• Authentication Algorithm: MD5 gives minimal security. SHA-1 gives higher
security. MD5 (Message Digest 5) and SHA1 (Secure Has h Algorithm) are hash
algorithms used to authenticate pac ket data. The SHA1 algorithm is generally
considered stronger than MD5, but is slower.
• Key Group: DH5 is more secure than DH1 or DH2 (although it may affect
throughput). DH1 (default) refers to Diffie-Hellman Group 1 a 768 bit random
number. DH2 refers to Diffie-Hellman Group 2 a 1024 bit (1Kb) random number.
DH5 refers to Diffie-Hellman Group 5 a 1536 bit random number.
• SA Life Time: Set how often the ZyWALL renegotiates the IKE SA. A short SA
life time increases security, but renegotiation temporarily disconnects the VPN
tunnel.
• NAT Traversal: Select this if the VPN tunnel must pass through NAT (there is a
NAT router between the IPSec devices).
Note: The remote IPSec device must also have NAT traversal enabled. See the help
in the main IPSec VPN screens or the User’s Guide VPN, NAT, and NAT
Traversal on page 403 for more information.
• Dead Peer Detection (DPD) has the ZyWALL make sure the remote IPSec
device is there before transmitting data through the IKE SA. If there has been
no traffic for at least 15 seconds, the ZyWALL sends a message to the remote
IPSec device. If it responds, the ZyWALL transmits the data. If it does not
respond, the ZyWALL shuts down the IKE SA.
• Authentication Method: Select Pre-Shared Key to use a password or
Certificate to use one of the ZyWALL’s certificates.
ZyWALL USG 50 User’s Guide
83
Chapter 5 Quick Setup
5.5.6 VPN Advanced Wizard - Phase 2
Phase 2 in an IKE uses the SA that was established in phase 1 to negot iate SAs for
IPSec.
Figure 49 VPN Advanced Wizard: Step 4
• Active Protocol: ESP is compatible with NAT, AH is not.
• Encapsulation: Tunnel is compatible with NAT, Transport is not.
• Encryption Algorithm: 3DES and AES use encryption. The longer the AES
key, the higher the security (this may affect throughput). Null uses no
encryption.
• Authentication Algorithm: MD5 gives minimal security. SHA-1 gives higher
security. MD5 (Message Digest 5) and SHA1 (Secure Has h Algorithm) are hash
algorithms used to authenticate pac ket data. The SHA1 algorithm is generally
considered stronger than MD5, but is slower.
• SA Life Time: Set how often the ZyWALL renegotiates the IKE SA. A short SA
life time increases security, but renegotiation temporarily disconnects the VPN
tunnel.
• Perfect Forward Secrecy (PFS): Disabling PFS allows faster IPSec setup, but is
less secure. Select DH1, DH2 or DH5 to enable PFS. DH5 is more secure than DH1 or DH2 (although it may affect throughput). DH1 refers to Diffie-Hellman
Group 1 a 768 bit random number. DH2 refers to Diffie-Hellman Group 2 a 1024
bit (1Kb) random number. DH5 refers to Diffie-Hellman Group 5 a 1536 bit
random number (more secure, yet slower).
• Local Policy (IP/Mask): Type the IP address of a computer on your network.
You can also specify a subnet. This must match the remote IP address
configured on the remote IPSec device.
84
• Remote Policy (IP/Mask): Type the IP address of a computer behind the
remote IPSec device. You can also specify a subnet. This must match the local
IP address configured on the remote IPSec device.
• Nailed-Up: This displays for the site-to-site and remote access client role
scenarios. Select this to have the ZyWALL automatically renegotiate the IPSec
SA when the SA life time expires.
ZyWALL USG 50 User’s Guide
5.5.7 VPN Advanced Wizard - Summary
This is a read-only summary of the VPN tunnel settings.
Figure 50 VPN Advanced Wizard: Step 5
Chapter 5 Quick Setup
• Rule Name: Identifies the VPN connection (and the VPN gateway).
• Secure Gateway: IP address or domain name of the remote IPSec device.
• Pre-Shared Key: VPN tunnel password.
• Certificate: The certificate the ZyWALL uses to identify itself when setting up
the VPN tunnel.
• Local Policy: IP address and subnet mask of the computers on the network
behind your ZyWALL that can use the tunnel.
• Remote Policy: IP address and subnet mask of the computers on the network
behind the remote IPSec device that can use the tunnel.
• Copy and paste the Configuration for Remote Gateway commands into
another ZLD-based ZyWALL’s command line interface.
•Click Save to save the VPN rule.
ZyWALL USG 50 User’s Guide
85
Chapter 5 Quick Setup
5.5.8 VPN Advanced Wizard - Finish
Now you can use the VPN tunnel.
Figure 51 VPN Wizard: Step 6: Advanced
86
Note: If you have not already done so, you can register your ZyWALL with
myZyXEL.com and activate trials of services like Content Filter.
Click Close to exit the wizard.
ZyWALL USG 50 User’s Guide
CHAPTER 6
Configuration Basics
This information is provided to help you configure the ZyW ALL effectively. Some of
it is helpful when you are just gett i n g st a r t ed. Some of it is provided for your
reference when you configure various features in the ZyWALL.
• Section 6.1 on page 87 introduces the ZyWALL’s object-based configuration.
• Section 6.2 on page 88 introduces zones, interfaces, and port groups.
• Section 6.3 on page 91 introduces some terminology and organization for the
ZyWALL.
• Section 6.4 on page 91 covers the ZyWALL’s packet flow.
• Section 6.5 on page 95 identifies the features you should conf igure before and
after you configure the main screens for each feature. For example, if you want
to configure a trunk for load-balancing, you should configure the member
interfaces before you configure the trunk. After you configure the trunk, you
should configure a policy route for it as well. (You might also have to configure
criteria for the policy route.)
• Section 6.6 on page 105 identifies the objects that store information used by
other features.
• Section 6.7 on page 106 introduces some of the tools available for system
management.
6.1 Object-based Configuration
The ZyWALL stores information or settings as objects. You use these objects to
configure many of the ZyWALL’s features and settings. Once you configure an
object, you can reuse it in configuring other features.
When you change an object’s settings, the ZyWALL automatically updates al l the
settings or rules that use the object. For example, if you create a schedule objec t,
you can have firewall, applicat ion patrol, content filter, and other settings use it. If
you modify the schedule, all the firewall, application patrol, content filter, and
other settings that use the schedule automatically apply the updated schedule.
You can create address objects based on an interface’s IP address, subnet, or
gateway. The Z y WALL automatically updates every rule or setting that uses these
objects whenever the interface’s IP address settings change. For example, if you
ZyWALL USG 50 User’s Guide
87
Chapter 6 Configuration Basics
change an Ethernet interface’s IP address, the ZyWALL automatically updates the
rules or settings that use the interface-based, LAN subnet address object.
You can use the Configuration > Objects screens to create objects before you
configure features that use them. If you are in a screen that uses objects, you can
also usually select Create new Object to be able to configure a new object. F or a
list of common objects, see Section 6.6 on page 105.
Use the Object Reference screen (Section 3.3.3.3 on page 53) to see what
objects are configured and which configuration settings reference specific objects.
6.2 Zones, Interfaces, and Physical Ports
Zones (groups of interfaces and VPN tunnels) simplify security settings. Here is an
overview of zones, interfaces, and physical ports in the ZyWALL.
Figure 52 Zones, Interfaces, and Physical Ethernet Ports
Zones
Interfaces
Physical Ports
WAN
wan1 wan2
LAN1
lan1
Table 13 Zones, Interfaces, and Physical Ethernet Ports
Zones
(WAN,LAN, DMZ)
Interfaces
(Ethernet,
VLAN,...)
Physical
Ethernet Ports
(P1, P2, ...)
A zone is a group of interfaces and VPN tunnels. Use zones to apply
security settings such as firewall, IDP, remote management, antivirus, and application patrol.
Interfaces are logical entities that (layer-3) packets pass through.
Use interfaces in configuring VPN, zones, trunks, DDNS, policy
routes, static routes, HTTP redirect, and NAT.
Port roles combine physical ports into interfaces.
The physical port is where you connect a cable. In configuration, you
use physical ports when configuring port groups. You use interfaces
and zones in configuring other features.
LAN2
lan2
DMZ
dmz
88
ZyWALL USG 50 User’s Guide
6.2.1 Interface Types
There are many types of interfaces in the ZyWALL. In addition to being used in
various features, interfaces also describe the network that is directly connected to
the ZyWALL.
• Ethernet interfaces are the foundation for defining other interfaces and
network policies. Y o u also configure RIP and OSPF in these interfaces.
• Port groups create a hardware connection between physical ports at the layer2 (data link, MAC address) level. Port groups are created when you use the
Interface > Port Roles screen to set multiple physical ports to be part of the
same (lan1, lan2 or dmz) interface.
• PPP interfaces support Point-to-Point Protocols (PPPoE or PPTP). ISP accounts
are required for PPPoE/PPTP interfaces.
• VLAN interfaces recognize tagged frames. The ZyWALL automatically adds or
removes the tags as needed. Each VLAN can only be associated with one
Ethernet interface.
• Bridge interfaces create a software connection between Ethernet or VLAN
interfaces at the layer-2 (data link, MAC address) level. Then, you can configure
the IP address and subnet mask of the bridge. It is also possible to configure
zone-level security between the member interfaces in the bridge.
Chapter 6 Configuration Basics
• Virtual interfaces increase the amount of routing information in the ZyWALL.
There are three types: virtual Ethernet interfaces (also known as IP alias),
virtual VLAN interfaces, and virtual bridge interfaces.
6.2.2 Default Interface and Zone Configuration
This section introduces the ZyWALL’ s default zone member ph ysical interfaces and
the default configuration of those interfaces. The following figure uses letters to
denote public IP addresses or part of a private IP address.
P1, P2wan1, wan2 WAN DHCP clientsConnections to the Internet
P3, P4lan1LAN1192.168.1.1, DHCP
P5lan2LAN2192.168.2.1, DHCP
P6dmzDMZ19 2.168.3.1, DHCP
CONSOLE n/aNoneNoneLocal management
IP ADDRESS AND DHCP
SETTINGS
server enabled
server enabled
server disabled
• The WAN zone contains the wan1 and wan2 interfaces (physical ports P1 and
P2). They use public IP addresses to connect to the Internet.
• The LAN1 zone contains the lan1 interface (a port group made up of physical
ports P3 and P4 on the Z yWALL). The LAN1 zone is a protected zone. The lan1
interface uses 192.168.1.1 and the connected devices use IP addresses in the
192.168.1.2 to 192.168.1.254 range.
• The LAN2 zone contains the lan2 interface. The LAN2 zone is a protected zone.
The lan2 interface uses 192.168.2.1 and the connected devices use IP
addresses in the 192.168.2.2 to 192.168.2.254 range.
• The DMZ zone contains the dmz interface (physical port P5). The DMZ zone has
servers that are available to the public. The dmz interface uses private IP
address 192.168.3.1 and the connected devices use private IP addresses in the
192.168.3.2 to 192.168.3.254 range.
SUGGESTED USE WITH
DEFAULT SETTINGS
Protected LAN
Protected LAN
Public servers (such as
web, e-mail and FTP)
90
ZyWALL USG 50 User’s Guide
6.3 Terminology in the ZyWALL
This section highlights some terminology or organization for ZLD-based ZyWALLs.
• Automatic SNAT and WAN trunk routing for traffic going from internal to
external interfaces (you don’t need to configure anything to all LAN to WAN
traffic).
The ZyWALL automatically adds al l of the external interfaces to the default W AN
trunk. External interfaces include ppp and cellular interfaces as well as any
Ethernet interfaces that are set as external interfaces.
Examples of internal interfaces are any Ethernet interfaces that you config ure as
internal interfaces.
• A policy route can be automatically disabled if the next-hop is dead.
• You do not need to set up policy routes for IPSec traffic.
• Policy routes can override direct routes.
• You do not need to set up policy routes for 1:1 NAT entries.
• You can create Many 1:1 NAT entries to translate a range of private network
addresses to a range of public IP addresses
• Static and dynamic routes have their own category.
6.4.1 Routing Table Checking Flow
When the ZyWALL receives packets it defragments them and applies destination
NAT. Then it examines the packets and determines how to route them. The
checking flow is from top to bottom. As soon as the packets match an entry in one
92
ZyWALL USG 50 User’s Guide
Chapter 6 Configuration Basics
of the sections, the ZyWALL stops checking the packets against the routing table
and moves on to the other checks, for example the firewall check.
Figure 53 Routing Table Checking Flow
1Direct-connected Subnets: The ZyWALL first checks to see if the packets are
destined for an address in the same subnet as one of the ZyWALL’ s interfaces. You
can override this and have the ZyWALL check the policy routes first by enabling
the policy route feature’s Use Policy Route to Override Direct Route option
(see Section 13.1 on page 281).
2Policy Routes: These are the user-configured policy routes. Configure policy
routes to send packets through the appropriate interface or VPN tunnel. See
Chapter 13 on page 281 for more on policy routes.
31 to 1 and Many 1 to 1 NAT: These are the 1 to 1 NAT and many 1 to 1 NAT
rules. If a private network server will initiate sessions to the outside clients, create
a 1 to 1 NAT entry to have the ZyWALL translate the source IP address of the
server’s outgoing traffic to the same publ i c IP address that the outside clients use
to access the server. A many 1 to 1 NAT entry works like multiple 1 to 1 NA T rules.
It maps a range of private network servers that will init iate sessions to the outside
clients to a range of public IP addresses. See Section 17.2.1 on page 324 for
more.
ZyWALL USG 50 User’s Guide
93
Chapter 6 Configuration Basics
4Auto VPN Policy: The ZyWALL automatically creates these routing entries for the
VPN rules. Disabling the IPSec VPN feature’s Use Policy Route to control dynamic IPSec rules option moves the routes for dynamic IPSec rules up above
the policy routes (see Section 23.2 on page 378).
5Static and Dynamic Routes: This section contains the user-configured static
routes and the dynamic routing information learned from other routers through
RIP and OSPF. See Chapter 13 on page 281 for more information.
6Default WAN Trunk: For any traffic coming in through an internal interface, if it
does not match any of the other routing entries, the ZyWALL forwards it through
the default WAN trunk. See Section 12.2 on page 276 for how to select which
trunk the ZyWALL uses as the default.
7Main Routing Table: The default WAN trunk is expected to be used for any traffic
that did not match any earlier routing entries.
6.4.2 NAT Table Checking Flow
The checking flow is from top to bottom. As soon as the packets match an entry in
one of the sections, the ZyWALL stops checking the pack ets against the NAT table
and moves on to bandwidth management.
Figure 54 NAT Table Checking Flow
94
1SNAT defined in the policy routes.
21 to 1 SNAT (including Many 1 to 1) is also included in the NAT table.
3NAT loopback is now included in the NAT table instead of requiring a separate
policy route.
ZyWALL USG 50 User’s Guide
Chapter 6 Configuration Basics
4SNAT is also now performed by default and included in the NAT table.
6.5 Feature Configuration Overview
This section provides information about configuring the main features in the
ZyWALL. The features are listed in the same sequence as the menu item(s) in the
Web Configurator. Each feature description is organized as shown below.
6.5.1 Feature
This provides a brief description. See the appropriate chapter(s) in this User’s
Guide for more information about any feature.
This shows you the sequence of menu items and tabs you should click
MENU ITEM(S)
to find the main screen(s) for this feature. See the web help or the
related User’s Guide chapter for information about each screen.
These are other features you should configure before you configure
the main screen(s) for this feature.
If you did not configure one of the prerequisites first, you can often
PREREQUISITES
WHERE USED
Example: This provides a simple example to show you how to configure this
feature. The example is usually based on the network topology in Figure 14 on
page 90.
select an option to create a new object. After you create the object
you return to the main screen to finish configuring the feature.
You may not have to configure everything in the list of prerequisites.
For example, you do not have to create a schedule for a policy route
unless time is one of the criterion.
There are two uses for this.
These are other features you should usually configure or check right
after you configure the main screen(s) for this feature. For example,
you should usually create a policy route for a VPN tunnel.
You have to delete the references to this feature before you can delete
any settings. For example, you have to delete (or modify) all the
policy routes that refer to a VPN tunnel before you can delete the VPN
tunnel.
Note: PREQUISITES or WHERE USED does not appear if there are no prerequisites
or references in other features to this one. For example, no other features
reference DDNS entries, so there is no WHERE USED entry.
ZyWALL USG 50 User’s Guide
95
Chapter 6 Configuration Basics
6.5.2 Licensing Registration
Use these screens to register your ZyWALL and subscribe to services like antivirus, IDP and application patrol, more SSL VPN tunnels, and content filtering. Y ou
must have Internet access to myZyXEL.com.
MENU ITEM(S)
PREREQUISITES
Configuration > Licensing > Registration
Internet access to myZyXEL.com
6.5.3 Licensing Update
Use these screens to update the ZyWALL’s signature packages for the anti-virus,
IDP and application patrol, and system protect features. You must have a valid
subscription to update the anti-virus and IDP/application patrol signatures. You
must have Internet access to myZyXEL.com.
MENU ITEM(S)
PREREQUISITES
Configuration > Licensing > Update
Registration (for anti-virus and IDP/application patrol), Internet
access to myZyXEL.com
6.5.4 Interface
See Section 6.2 on page 88 for background information.
Note: When you create an interface, there is no security applied on it until you assign
it to a zone.
96
Most of the features that use interfaces support Ethernet, PPPoE/PPTP, cellular,
VLAN, and bridge interfaces.
MENU ITEM(S)
PREREQUISITES
WHERE USED
Example: The dmz interface is in the DMZ zone and uses a private IP address. T o
configure dmz’s settings, click Network > Interface > Ethernet and then the
Port groups (configured in the Interface > Port Grouping screen)
Zones, trunks, IPSec VPN, DDNS, policy routes, static routes, HTTP
redirect, NAT, application patrol
ZyWALL USG 50 User’s Guide
6.5.5 Trunks
Use trunks to set up load balancing using two or more interfaces.
Chapter 6 Configuration Basics
MENU ITEM(S)
PREREQUISITES
WHERE USED
Example: See Chapter 7 on page 109.
6.5.6 Policy Routes
Use policy routes to override the ZyWALL’s default routing behavior in order to
send packets through the appropriate interface or VPN tunnel. You can also use
policy routes for bandwidth management (out of the ZyWALL), port triggering,
and general NAT on the source address. Y ou have to set up the criteria, next -hops,
and NAT settings first.
MENU ITEM(S)
PREREQUISITES
Configuration > Network > Interface > Trunk
Interfaces
Policy routes
Configuration > Network > Routing > Policy Route
Criteria: users, user groups, interfaces (incoming), IPSec VPN
(incoming), addresses (source, destination), address groups (source,
destination), schedules, services, service groups
NAT: addresses (translated address), services and service groups
(port triggering)
Example: Yo u have an FTP server connected to P6 (in the DMZ zone). You want
to limit the amount of FTP traffic that goes out from the FTP server through your
WAN connection.
1Create an address object for the FTP server (Object > Address).
2Click Configuration > Network > Routing > Policy Route to go to the policy
route configuration screen. Add a policy route.
3Name the policy route.
4Select the interface that the traffic comes in through (P3 in this example).
5Select the FTP server’s address as the source address.
6You don’t need to specify the destination address or the schedule.
7For the service, select FTP.
ZyWALL USG 50 User’s Guide
97
Chapter 6 Configuration Basics
8For the Next Hop fields, select Interface as the Type if you have a single WAN
connection or Trunk if you have multiple WAN connections.
9Select the interface that you are using for your WAN connection (wan1 and wan2
are the default WAN interfaces). If you hav e multiple W AN connections, select the
trunk.
10 Specify the amount of bandwidth FTP traffic can use. You may also want to set a
low priority for FTP traffic.
Note: The ZyWALL checks the policy rou tes in the order that they are listed. So make
sure that your custom policy route comes before any other routes that would
also match the FTP traffic.
6.5.7 Static Routes
Use static routes to tell the ZyWALL about networks not directly connected to the
ZyWALL.
MENU ITEM(S)
PREREQUISITES
6.5.8 Zones
See Section 6.2 on page 88 for background information. A zone is a group of
interfaces and VPN tunnels. The ZyWALL uses zones, not interfaces, in many
security settings, such as firewall rules and remote management.
Zones cannot overlap. Each interface and VPN tunnel can be assigned to at most
one zone. Virtual interfaces are automatically assigned to the same zone as the
interface on which they run. When you create a zone, the ZyWALL does not create
any firewall rules, assign an IDP profile, or configure remote management for the
new zone.
MENU ITEM(S)
PREREQUISITES
WHERE USED
Example: For example, to create the DMZ-2 z o ne, click Network > Zone and
then the Add icon.
Dynamic DNS maps a domain name to a dynamic IP address. The ZyWALL helps
maintain this mapping.
Chapter 6 Configuration Basics
MENU ITEM(S)
PREREQUISITES
6.5.10 NAT
Use Network Address Translation (NAT) to make computers on a private network
behind the ZyWALL available outside the private network.
The ZyWALL only checks regular (through-ZyWALL) firewall rules for packets that
are redirected by NAT, it does not check the to-ZyWALL firewall rules.
MENU ITEM(S)
PREREQUISITES
Example: Suppose you have an FTP server with a private IP address connected to
a DMZ port. You could configure a NAT rule to forwards FTP sessions from the
WAN to the DMZ.
1Click Configuration > Network > NAT to configure the NAT entry. Add an entry.
Configuration > Network > DDNS
Interface
Configuration > Network > NAT
Interfaces, addresses (HOST)
2Name the entry.
3Select the WAN interface that the FTP traffic is to come in through.
4Specify the public WAN IP address where the ZyWALL wil l recei ve the FTP packets .
5In the Mapped IP field, list the IP address of the FTP server. The ZyWALL will
forward the packets received for the original IP address.
6In Mapping Type, select Port.
7Enter 21 in both the Original and the Mapped Port fields.
6.5.11 HTTP Redirect
Configure this feature to have the ZyWALL transparently forward HTTP (web)
traffic to a proxy server. This can speed up web browsing because the proxy server
keeps copies of the web pages that have been accessed so they are readily
available the next time one of your users needs to access that page.
ZyWALL USG 50 User’s Guide
99
Chapter 6 Configuration Basics
The ZyWALL does not check to-ZyWALL firewall rules for packets that are
redirected by HTTP redirect. It does check regular (through-ZyWALL) firewall
rules.
MENU ITEM(S)
PREREQUISITES
Example: Suppose you want HTTP requests from y our LAN to go to a HTTP proxy
server at IP address 192.168.3.80.
1Click Configuration > Network > HTTP Redirect.
2Add an entry.
3Name the entry.
4Select the interface from which you want to redirect incoming HTT P requests
(lan1).
5Specify the IP address of the HTTP proxy server.
6Specify the port number to use for the HTTP traffic that you forward to the proxy
server.
Configuration > Network > HTTP Redirect
Interfaces
6.5.12 ALG
The ZyWALL’s Application Layer Gateway (ALG) allows VoIP and FTP applications
to go through NAT on the ZyWALL. You can also specify additional signaling port
numbers.
MENU ITEM(S)
6.5.13 Auth. Policy
Use authentication policies to control who can access the network. You can
authenticate users (require them to log in) and even perform Endpoint Security
(EPS) checking to make sure users’ computers comply with defined corporate
policies before they can access the network.